International audienceThe security of shared High Performance Com- puting clusters is still an open research problem. Existing solutions deal with sandboxing and Discretionary Access Con- trol for controlling remote connections. Guaranteeing security properties for a shared cluster is complex since users demand an environment at the same time efficient and preventing confidentiality and integrity violations. This paper studies two different approaches for protecting remote interactive accesses against malicious operations. Those two approaches leverage the SELinux protection. They have been successfully implemented using standard MAC from SELinux, and guar- antee supplementary security properties thanks to our PIGA HIPS. The paper compares ...
With the increasing use of clusters and distributed networks in industry, research, and scientific d...
Abstract. Large-scale commodity cluster systems are finding increasing deployment in academic, resea...
Modern distributed systems are composed from several off-the-shelf components, including operating s...
International audienceProtecting a shared High Performance Computing cluster is still an open resear...
International audienceHPC clusters are costly resources, hence nowadays these structures tend to be ...
International audienceProtecting a HPC cluster against real world cyber threats is a critical task, ...
International audienceThe protection of High Performance Computing architectures is still an open re...
International audienceModern operating systems continue to be the victims of attacks and information...
This paper proposes to address new requirements of confidentiality, integrity and availability prope...
International audienceMandatory Access Control is really poorly supported by Cloud environments. Our...
High Performance Computing facilities that use cluster computing to provide computational services t...
International audienceAssessing the impact of Mandatory Access Control (MAC) integration on the Linu...
The main contribution of this paper is to investigate issues in using Mandatory Access Controls (MAC...
Recently proposed usage control concept and models ex-tend traditional access control models with fe...
In the modern computing world, a secure system is best implemented with mandatory access control (MA...
With the increasing use of clusters and distributed networks in industry, research, and scientific d...
Abstract. Large-scale commodity cluster systems are finding increasing deployment in academic, resea...
Modern distributed systems are composed from several off-the-shelf components, including operating s...
International audienceProtecting a shared High Performance Computing cluster is still an open resear...
International audienceHPC clusters are costly resources, hence nowadays these structures tend to be ...
International audienceProtecting a HPC cluster against real world cyber threats is a critical task, ...
International audienceThe protection of High Performance Computing architectures is still an open re...
International audienceModern operating systems continue to be the victims of attacks and information...
This paper proposes to address new requirements of confidentiality, integrity and availability prope...
International audienceMandatory Access Control is really poorly supported by Cloud environments. Our...
High Performance Computing facilities that use cluster computing to provide computational services t...
International audienceAssessing the impact of Mandatory Access Control (MAC) integration on the Linu...
The main contribution of this paper is to investigate issues in using Mandatory Access Controls (MAC...
Recently proposed usage control concept and models ex-tend traditional access control models with fe...
In the modern computing world, a secure system is best implemented with mandatory access control (MA...
With the increasing use of clusters and distributed networks in industry, research, and scientific d...
Abstract. Large-scale commodity cluster systems are finding increasing deployment in academic, resea...
Modern distributed systems are composed from several off-the-shelf components, including operating s...